Category: Cybersecurity

There was a time when ransomware was the weapon of choice for hackers. Now, it seems that cryptohacking has become the preferred method of making money. Following a recent number of mining hacks, Tesla has become the latest firm to […]

In the last few years, there has been a simmering identity theft fraud, where scammers get a hold on your personal details, including your phone number, and try to access bank and other payment accounts you might have associated with […]

Microsoft is taking action against applications that use scare tactics to swindle money out of consumers. From March 1, Windows Defender and other Microsoft security products will classify programs that display “coercive messages” as unwanted software. Upon detection, such programs […]

The numerous data breaches that occurred over the years clearly indicate that cybersecurity is still prone to failure. Every new security measure system defenders come up with is eventually thwarted by hackers. The number of affected users is staggering. A […]

Last week, the npm registry had an operations incident that caused a number of highly depended on packages, such as require-from-string to become unavailable. While the incident was relatively straightforward to solve, it uncovered a major security vulnerability that could […]

Today organizations large and small are exploring the adoption of cloud-native software technologies. “Cloud-native” refers to an approach that packages software within standardized units called containers, arranges those units into microservices that interface with each other to form applications, and […]

At its Universe conference, GitHub has announced a number of features aiming to make your code more protected. These include a dependency graph and, built on top of the former, security alerts. Additionally, GitHub now provides a recommender, which promises […]

A new vulnerability has been discovered that could allow an attacker to take control of a device using Bluetooth. As long as the victim has bluetooth activated and the attacker is within 32 feet, that is all that’s necessary to […]

The software we run has never been more difficult to vouchsafe than it is today. It is scattered between local deployments and cloud services, built with open source components that aren’t always a known quantity, and delivered on a fast-moving […]

Computer systems from the Ukraine to the United States were affected last week by the Petya cyber attack. It’s similar to the recent WannaCry ransomware attack last month. The WannaCry ransomware took advantage of vulnerabilities in the older versions of Windows that allowed […]